Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration. Job Summary. . The. IT Risk Analyst. is responsible for the identification, evaluation, and assessment of cybersecurity risks affecting United Fidelity Bank, from threats to vulnerabilities and including ongoing reviews and audits of controls. The incumbent will work closely with other functional area subject matter ...
It's fun to work at a company where people truly BELIEVE in what they're doing. We're committed to bringing passion and customer focus to the business. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration. Job Summary: The IT Risk Analyst is responsible for the identification, evaluation, and assessment of cybersecurity risks affecting United Fidelity Bank, from threats...
It's fun to work at a company where people truly BELIEVE in what they're doing. We're committed to bringing passion and customer focus to the business. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration. Job Summary: The IT Risk Analyst is responsible for the identification, evaluation, and assessment of cybersecurity risks affecting United Fidelity Bank, from threats...
It's fun to work at a company where people truly BELIEVE in what they're doing. We're committed to bringing passion and customer focus to the business. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration. Job Summary: The IT Risk Analyst is responsible for the identification, evaluation, and assessment of cybersecurity risks affecting United Fidelity Bank, from threats...
Maintains a high skill level of risk management and systems knowledge as it relates to the overall corporate technology environment. Is primarily responsible for conducting the Information Technology (IT) risk assessment processes which include asset identification, threat identification, mitigating control identification and reporting of the IT asset’s inherent and residual risk ratings across all Information Technology assets of the organizatio...